Licensed Digital Forensic Examiner

The PTG Digital Forensics Lab

Court-ready forensic examinations, expert witness testimony, and legally defensible evidence handling from a dedicated forensics lab serving Raleigh, Durham, Chapel Hill, and courts across North Carolina since 2002.

BBB Accredited Since 2003 | Founded 2002 | 2,500+ Clients Served | As Featured on ABC, CBS, NBC, FOX
Watch

Expert Witness Testimony in Action

Craig Petronella delivers expert witness testimony on digital forensics and cybersecurity matters in North Carolina courts.

The Forensics Practice

Inside the PTG Digital Forensics Lab

The Petronella Technology Group Digital Forensics Lab is a dedicated forensic examination facility located in Raleigh, North Carolina. Unlike general IT service providers that offer forensic work as a secondary capability, PTG maintains a purpose-built forensic practice with the specialized equipment, controlled environment, and chain of custody protocols that the legal system demands. Our lab is where raw digital media is transformed into court-ready evidence through rigorous, repeatable scientific processes that have withstood adversarial scrutiny in state and federal proceedings across North Carolina.

The lab is equipped with enterprise-grade forensic workstations, write-blocking hardware for every major interface type including SATA, NVMe, USB, and legacy IDE connections, and secure evidence storage that maintains strict chain of custody from intake through final disposition. Every piece of evidence that enters the lab is logged, photographed, hashed, and tracked through a documented custody protocol. Our forensic imaging systems create verified bit-for-bit copies of storage media using dual-hash verification, meaning SHA-256 and MD5 hashes are calculated simultaneously and validated to confirm that not a single byte has been altered during the acquisition process.

The PTG forensic practice serves a distinct function from our managed IT and cybersecurity consulting services. While those services focus on prevention, monitoring, and incident response, the forensic lab is a fact-finding operation. Its purpose is the scientific examination of digital evidence to establish what happened, when it happened, how it happened, and who was responsible. The findings produced in this lab are intended for consumption by attorneys, judges, juries, insurance adjusters, corporate boards, and regulatory agencies. Every report, every analysis, and every conclusion that leaves this lab is prepared with the assumption that it will be challenged under oath.

Since 2002, PTG has served more than 2,500 clients across the Research Triangle and throughout North Carolina. The forensic lab has supported investigations involving Fortune 500 companies, small businesses, law firms, government agencies, and individual litigants. Our work spans civil and criminal matters, from intellectual property theft and employee misconduct to ransomware attacks and multi-million-dollar fraud cases. The lab operates under the same evidentiary standards regardless of case size, because the integrity of forensic evidence does not depend on the dollar amount in dispute.

25+ Years of Forensic Experience
2,500+ Clients Served Since 2002
2003 BBB Accredited Since
NC State Courts Served
Lead Forensic Examiner

Craig Petronella, Licensed Digital Forensic Examiner

Craig Petronella is the founder and CEO of Petronella Technology Group and serves as the firm's lead Licensed Digital Forensic Examiner. With more than 25 years of hands-on experience in cybersecurity, digital forensics, and IT infrastructure, Craig has built one of the Research Triangle's most respected forensic practices. His work combines deep technical expertise with the communication skills required to translate complex forensic findings into clear, persuasive testimony that judges and juries can understand and act upon.

As a Licensed Digital Forensic Examiner, Craig operates under the professional standards and ethical obligations that North Carolina law imposes on forensic practitioners. This licensure is not a voluntary certification; it is a state-regulated designation that requires demonstrated competence, continuing education, and adherence to professional standards of conduct. When Craig signs a forensic report or takes the stand as an expert witness, his findings carry the weight of a licensed professional who is personally accountable for the accuracy and integrity of his work.

Craig holds a CMMC Certified Registered Practitioner designation and MIT certifications in cybersecurity, artificial intelligence, blockchain, and compliance. He is the Amazon number-one best-selling author of multiple books on cybersecurity and compliance, including "How HIPAA Can Crush Your Medical Practice," "How Hackers Can Crush Your Law Firm," and "The Ultimate Guide To CMMC." His expertise has been recognized by major media outlets, with featured appearances on ABC, CBS, NBC, FOX, and WRAL, where he has provided expert commentary on cybercrime, data breaches, and digital privacy.

Beyond his forensic practice, Craig serves as an expert witness for law firms throughout North Carolina and beyond, providing depositions and courtroom testimony in cases involving cybercrime, data breaches, intellectual property theft, compliance failures, and digital evidence authentication. His ability to explain highly technical forensic concepts in plain language, while maintaining scientific precision, makes him an effective advocate for the truth in adversarial legal proceedings. Attorneys on both sides of the aisle seek Craig's expertise because his findings are rooted in evidence and his methodology is transparent, reproducible, and defensible.

Licensed Digital Forensic Examiner CMMC CRP MIT Certified Amazon #1 Bestselling Author 25+ Years Experience Featured on ABC/CBS/NBC/FOX/WRAL
Lab Capabilities

Forensic Examination Capabilities

Our forensic lab maintains the equipment, software, and expertise to examine evidence across every major digital platform and device category.

Computer and Server Forensics

Forensic imaging and analysis of desktops, laptops, servers, and workstations running Windows, macOS, and Linux operating systems. We examine file systems, registry artifacts, event logs, user activity, application data, browser history, email databases, and deleted or hidden data. Our analysis extends to encrypted volumes, virtual machines, and RAID arrays, with the capability to recover data from damaged or failing storage media.

Mobile Device Forensics

Extraction and analysis of data from smartphones, tablets, and wearable devices across iOS and Android platforms. We recover text messages, call logs, contacts, photos, videos, application data, GPS location history, Wi-Fi connection records, and deleted content. Our mobile forensics capabilities include logical, file system, and physical extractions depending on the device model, operating system version, and encryption status.

Network and Log Forensics

Analysis of network traffic captures, firewall logs, intrusion detection and prevention system alerts, DNS query logs, DHCP lease records, VPN connection logs, and authentication records. We reconstruct network-based activity to identify unauthorized access, data exfiltration paths, lateral movement by attackers, and communication between compromised systems and command-and-control infrastructure.

Cloud and SaaS Forensics

Forensic examination of cloud environments including Amazon Web Services, Microsoft Azure, Google Cloud Platform, Microsoft 365, and Google Workspace. Cloud forensics requires specialized techniques because evidence is distributed, volatile, and governed by provider-specific access mechanisms. We collect and preserve cloud-based evidence including access logs, file modification histories, sharing permissions, and administrative audit trails.

Email and Communications Forensics

Detailed analysis of email communications including header examination, routing analysis, attachment investigation, and metadata extraction. We trace the origin and path of email messages, identify spoofed or forged communications, analyze business email compromise attacks, and recover deleted correspondence from mail servers, local archives, and cloud-based email platforms. This work is frequently central to fraud, harassment, and intellectual property cases.

Malware and Ransomware Analysis

Controlled examination of malware specimens including ransomware, trojans, rootkits, keyloggers, and remote access tools. We perform both static and dynamic analysis to determine the malware's capabilities, behavior, communication patterns, and indicators of compromise. Our findings identify the attack vector, the scope of the compromise, and the specific data that was accessed or exfiltrated, providing critical intelligence for both remediation and legal proceedings.

Cryptocurrency and Blockchain Analysis

Tracing and analysis of cryptocurrency transactions across major blockchain networks. In cases involving ransomware payments, fraud, money laundering, or SIM swap attacks, we trace the flow of funds through blockchain addresses, identify exchange interactions, and document transaction histories. This capability is increasingly important as cybercriminals adopt cryptocurrency as their preferred payment mechanism.

Data Recovery and Reconstruction

Recovery of data from damaged, corrupted, encrypted, or intentionally wiped storage devices. We employ forensic recovery techniques that go beyond standard data recovery services, including examination of file system slack space, unallocated disk areas, and residual data in memory dumps. When evidence has been deliberately destroyed, we document the anti-forensic techniques used, which can itself be powerful evidence of intent and consciousness of guilt.

Expert Witness

Expert Witness and Courtroom Testimony

When digital evidence must be presented in court, the credibility and clarity of the expert witness can determine the outcome. Craig Petronella provides expert testimony that translates complex technical findings into language that judges, juries, and opposing counsel can evaluate.

What Our Expert Witness Services Include

Deposition and Trial Testimony: Craig Petronella provides sworn testimony in depositions and at trial, presenting forensic findings with the clarity and precision that legal proceedings demand. His testimony covers the methodology used, the evidence examined, the conclusions reached, and the basis for those conclusions. Years of courtroom experience have refined his ability to withstand rigorous cross-examination while maintaining composure and credibility.

Forensic Expert Reports: Our expert reports are comprehensive documents that detail the scope of the examination, the tools and methods employed, the chain of custody documentation, the findings, and the examiner's professional opinions. These reports are written to satisfy the requirements of Rule 702 of the North Carolina Rules of Evidence and Federal Rule of Evidence 702, which govern the admissibility of expert testimony. Every opinion expressed in our reports is supported by the evidence and explained in sufficient detail that another qualified examiner could reproduce the analysis.

Opposing Expert Review: We review and analyze the forensic reports, methodology, and conclusions of opposing experts. This peer review process identifies gaps, errors, unsupported conclusions, and methodological weaknesses in the opposing expert's work. Our critique is fact-based and technical, providing your legal team with specific areas to challenge during cross-examination.

Litigation Consulting: Before and during litigation, we work directly with your legal team to help them understand the technical aspects of the case, formulate questions for depositions and cross-examinations, evaluate the strength of digital evidence, and develop the technical narrative of the case. Our litigation consulting ensures that attorneys are fully prepared to present or challenge digital evidence effectively.

eDiscovery Support: We assist with the identification, preservation, collection, processing, review, and production of electronically stored information in litigation. Our eDiscovery support ensures that relevant data is collected in a defensible manner, processed efficiently, and produced in the format required by the court or opposing counsel. We help legal teams navigate the technical complexities of electronic data while maintaining compliance with discovery obligations.

Our Process

The PTG Forensic Examination Process

Our forensic methodology follows NIST Special Publication 800-86 guidelines and the Scientific Working Group on Digital Evidence (SWGDE) best practices, ensuring defensible and reproducible results.

  1. Initial Consultation and Case Assessment

    Every engagement begins with a confidential consultation to understand the facts, the legal context, the timeline, and the desired outcomes. We assess the scope of the potential examination, identify likely evidence sources, discuss preservation requirements, and provide a preliminary estimate of cost and timeline. For active litigation, we coordinate directly with your legal counsel to ensure that our work falls within the scope of attorney-client privilege or work product protection as appropriate.

  2. Evidence Identification and Collection

    We identify all potential sources of relevant digital evidence, including computers, servers, mobile devices, cloud accounts, network equipment, backup systems, and removable media. Evidence collection is performed using forensically sound methods that preserve the original data in its unaltered state. We use hardware write-blockers to prevent any modification to original media, and we document every step of the collection process to establish an unbroken chain of custody.

  3. Forensic Imaging and Verification

    We create exact bit-for-bit forensic images of all evidence media. Each image is verified using dual-hash algorithms, with both SHA-256 and MD5 checksums calculated and recorded. The forensic images, not the original media, are used for all subsequent analysis. This approach preserves the original evidence in its pristine state while providing our examiners with complete working copies. Original evidence is stored in our secure evidence room under documented chain of custody.

  4. Systematic Analysis and Examination

    Our forensic examiners analyze the evidence using industry-validated tools and techniques. The analysis is guided by the specific questions the case presents, but is conducted with sufficient breadth to identify relevant evidence that may not have been anticipated. We examine file systems, application artifacts, communication records, user activity timelines, metadata, deleted and hidden data, and system logs. Every finding is documented with reference to its source, enabling independent verification.

  5. Timeline Reconstruction and Correlation

    We construct detailed timelines of relevant activity by correlating evidence across multiple sources. File system timestamps, email headers, log entries, authentication records, and application artifacts are integrated into a unified chronology that reveals the sequence of events. This timeline becomes a powerful analytical tool for understanding what happened and for presenting findings in a narrative format that is accessible to non-technical audiences.

  6. Reporting and Expert Testimony

    Our forensic reports document the entire examination process: the evidence received, the methods used, the analysis performed, the findings, and the examiner's professional conclusions. Reports are written to be technically rigorous while remaining comprehensible to attorneys, judges, and juries. When testimony is required, Craig Petronella is available for depositions and courtroom appearances, presenting findings with clarity, confidence, and the credibility of a licensed forensic examiner.

Case Types

Types of Cases We Investigate

Our forensic lab supports investigations across a broad range of civil, criminal, regulatory, and corporate matters. Below are the primary case categories we handle.

Cybercrime and Data Breaches

Investigation of unauthorized access, hacking incidents, ransomware attacks, phishing compromises, and data exfiltration events. We determine the scope of the breach, identify the attack vector, document the data affected, and produce findings that satisfy regulatory notification requirements and support law enforcement referrals.

Intellectual Property Theft

Forensic examination of devices and accounts to identify unauthorized copying, transmission, or deletion of proprietary information, trade secrets, source code, customer lists, and confidential business data. We trace data movement, document exfiltration methods, and establish timelines that correlate with employee departures or competitive activity.

Employee Misconduct

Investigation of policy violations, unauthorized system access, misuse of company resources, harassment via electronic communications, and sabotage. We collect and analyze digital evidence in a manner that is both legally sound and consistent with employment law requirements, including considerations around reasonable expectation of privacy.

Fraud and Financial Crimes

Digital forensics in support of fraud investigations including business email compromise, wire fraud, insurance fraud, embezzlement, and cryptocurrency-related financial crimes. We trace electronic communications, financial transactions, and document manipulation to build the evidentiary foundation for civil recovery or criminal prosecution.

Family Law and Domestic Cases

Forensic examination of digital evidence in custody disputes, divorce proceedings, and protective order cases. We handle these sensitive matters with discretion while maintaining the same forensic rigor applied to commercial cases. Evidence from phones, computers, social media accounts, and location data can be critical in family court proceedings.

Regulatory and Compliance Investigations

Forensic support for investigations triggered by regulatory inquiries from bodies such as the HHS Office for Civil Rights (HIPAA), the FTC, state attorneys general, and industry-specific regulators. We produce evidence and documentation that satisfies the specific requirements of the applicable regulatory framework, including HIPAA, PCI DSS, SOC 2, and CMMC.

Insurance Claims

Forensic investigation in support of cyber insurance claims, providing carriers and policyholders with the detailed technical documentation needed to evaluate claims, determine coverage, and quantify losses. Our reports document the incident timeline, root cause, data exposure, and remediation costs with the specificity that adjusters require.

SIM Swap and Identity Fraud

Investigation of SIM swap attacks and identity-related cybercrimes where attackers take control of phone numbers to bypass two-factor authentication and access financial accounts. We trace the attack chain from the social engineering of the carrier through the compromise of accounts and movement of funds, providing evidence for both civil recovery and criminal referral.

Evidence Integrity

Evidence Handling and Chain of Custody

The admissibility of digital evidence in court depends on an unbroken chain of custody and demonstrable evidence integrity. A single gap in documentation or a single unverified step in the handling process can render evidence inadmissible, regardless of how compelling the findings might be. The PTG Digital Forensics Lab treats chain of custody as foundational, not supplementary, to every forensic engagement.

When evidence arrives at our lab, it is immediately logged into our evidence tracking system. Every item is assigned a unique identifier, photographed in its received condition, and documented with details including the source, the date and time of receipt, the condition upon arrival, and the identity of the person who delivered it. From that point forward, every interaction with the evidence is logged: who accessed it, when, for what purpose, and what was done. This creates a complete audit trail that can be presented to the court to demonstrate that the evidence has been properly handled from intake through testimony.

Our evidence storage area is physically secured with access controls that limit entry to authorized forensic personnel. Evidence is stored in conditions that protect it from environmental damage, electromagnetic interference, and unauthorized access. When evidence must be transported, whether to court, to another examiner, or back to the client, the transfer is documented with the same level of detail as the initial intake. Our chain of custody documentation has been accepted without challenge in proceedings in Wake County, Durham County, Orange County, and other jurisdictions across North Carolina.

The integrity of forensic images is verified at every critical step. When a forensic image is created, its hash values are calculated and recorded. Before any analysis session begins, those hash values are recalculated and compared to the original values to confirm that the image has not been altered. This verification process is documented in our forensic reports, providing an unassailable record that the evidence analyzed is an exact, unmodified copy of the original. This discipline is what separates forensic examination from ordinary IT investigation, and it is what makes our findings trustworthy in a legal setting.

Standards

Forensic Standards and Certifications

Our forensic practice operates in alignment with recognized standards and frameworks that govern digital forensic examination. Adherence to these standards ensures that our work is consistent, reproducible, and defensible regardless of the venue or the complexity of the matter.

  • NIST SP 800-86: Guide to Integrating Forensic Techniques into Incident Response. Our examination methodology follows the four-phase NIST forensic process: collection, examination, analysis, and reporting.
  • SWGDE Best Practices: Scientific Working Group on Digital Evidence guidelines for the forensic examination of digital evidence, including best practices for imaging, analysis, and quality assurance.
  • Federal Rules of Evidence (Rule 702): Our expert testimony and reports are prepared to satisfy the Daubert standard and its state equivalents, ensuring admissibility in both federal and North Carolina state courts.
  • North Carolina General Statutes Chapter 74F: Our practice complies with the Private Protective Services Act, which governs the licensing and conduct of digital forensic examiners in North Carolina.
  • CMMC 2.0 / NIST 800-171: As a CMMC Certified Registered Practitioner, Craig Petronella brings compliance expertise that is directly relevant to forensic investigations involving defense contractors and controlled unclassified information.

PTG holds additional certifications and credentials including CCNA, MCNS, and Microsoft Cloud Essentials. Our team's expertise spans the compliance frameworks most commonly implicated in forensic investigations, including HIPAA, FTC Safeguards Rule, SOC 2 Type II, PCI DSS, GDPR, CCPA, and ISO 27001. This breadth of knowledge allows us to conduct forensic investigations with an awareness of the regulatory context in which the evidence will be used.

FAQ

Frequently Asked Questions

What makes the PTG forensic lab different from a general IT services company?
The PTG Digital Forensics Lab is a dedicated forensic examination facility led by a Licensed Digital Forensic Examiner. Unlike general IT companies that may offer forensic work as an add-on service, our lab maintains purpose-built forensic workstations, hardware write-blockers, secure evidence storage, and documented chain of custody protocols that meet the evidentiary standards required by courts. Every process in our lab is designed with the assumption that the results will be challenged under oath in a legal proceeding.
What does it mean that Craig Petronella is a Licensed Digital Forensic Examiner?
In North Carolina, a Licensed Digital Forensic Examiner is a state-regulated professional designation governed by Chapter 74F of the General Statutes (Private Protective Services Act). This licensure requires demonstrated competence, ongoing continuing education, and adherence to professional standards of conduct. It is not a voluntary industry certification. When Craig signs a forensic report or provides expert testimony, he does so as a licensed professional who is personally accountable to the state for the accuracy and integrity of his work.
When should I contact a digital forensics lab?
Contact us as soon as you suspect a cybersecurity incident, discover potential employee misconduct, receive a litigation hold notice, learn of a data breach, or need to investigate any situation involving digital evidence. Time is critical in forensic investigations because digital evidence can be overwritten, deleted, or lost as systems continue to operate. Early engagement with a forensic lab dramatically improves the likelihood of recovering relevant evidence and preserving its admissibility.
Is the evidence you collect admissible in North Carolina courts?
Yes. Our forensic methodology, tools, chain of custody procedures, and reporting standards are designed specifically to produce evidence that meets the admissibility requirements of both North Carolina state courts and federal courts. Our work follows NIST SP 800-86 guidelines and SWGDE best practices, and our expert reports are prepared to satisfy Rule 702 standards for expert testimony. Craig Petronella has provided expert testimony in courts across North Carolina without successful challenge to the admissibility of his forensic findings.
Can you recover deleted files and data?
In many cases, yes. When files are deleted from a computer or mobile device, the data often remains on the storage medium until it is physically overwritten by new data. Our forensic tools examine unallocated disk space, file system slack space, and residual data to recover deleted files, file fragments, and metadata. The likelihood of successful recovery depends on the type of storage media, how much time has elapsed since deletion, and how much the device has been used. We also document evidence of deliberate data destruction, including the use of anti-forensic wiping tools, which can itself serve as evidence of intent.
How long does a forensic investigation typically take?
The timeline depends on the scope and complexity of the investigation. A focused examination of a single computer or mobile device may be completed in a matter of days. Complex investigations involving multiple systems, large data volumes, cloud environments, or network infrastructure may take several weeks. During our initial consultation, we provide a realistic timeline estimate based on the specifics of your case. We also offer expedited services for time-sensitive matters such as active litigation deadlines or ongoing cybersecurity incidents.
Will the forensic investigation disrupt our business operations?
We design our forensic process to minimize operational disruption. In most cases, we create forensic images of systems and analyze the copies in our lab, allowing the original systems to continue operating. For mobile devices and laptops, the imaging process typically takes a few hours, after which the devices are returned. When the nature of the investigation requires taking a system offline or preserving it in its current state, we coordinate with your team to schedule the work at the least disruptive time and provide guidance on alternative arrangements.
Can you provide expert witness testimony in federal court?
Yes. Craig Petronella provides expert witness testimony in both state and federal courts. Our forensic reports and testimony are prepared to satisfy the requirements of Federal Rule of Evidence 702 and the Daubert standard, which governs the admissibility of expert testimony in federal proceedings. Craig's qualifications, methodology, and prior testimony record provide the foundation for qualification as an expert witness under these standards.
What areas of North Carolina do you serve?
Our forensic lab is located in Raleigh, North Carolina, and we serve clients throughout the Research Triangle region including Raleigh, Durham, Chapel Hill, Cary, Apex, Morrisville, Wake Forest, and Holly Springs. We also accept engagements from clients across the state and provide expert testimony in courts throughout North Carolina. For cases outside our immediate region, evidence can be shipped to our lab using documented chain of custody procedures, and depositions can be conducted remotely when appropriate.
How do you maintain chain of custody for digital evidence?
Every piece of evidence that enters our lab is immediately logged into our evidence tracking system with a unique identifier, photographed, and documented with details including source, condition, and the identity of the delivering party. Every subsequent interaction with the evidence is logged with who accessed it, when, and for what purpose. Evidence is stored in a physically secured area with access controls. Forensic images are verified using dual-hash algorithms (SHA-256 and MD5) at creation and before each analysis session. This comprehensive documentation creates an unbroken chain of custody record that can be presented in court.
What is the difference between this forensic lab page and your digital forensics solutions page?
This page describes the PTG Digital Forensics Lab itself: the facility, the forensic practice, Craig Petronella's credentials as a Licensed Digital Forensic Examiner, expert witness services, and the specific examination capabilities we offer. Our digital forensics solutions page focuses on how our forensic services integrate with broader incident response, compliance, and cybersecurity solutions for businesses. Think of this page as describing the forensic practice and the examiner, and the solutions page as describing how forensic services apply to specific business problems.
How much does a forensic investigation cost?
The cost of a forensic investigation depends on the scope of the examination, the number and type of devices involved, the volume of data, and the complexity of the analysis required. We provide detailed cost estimates after our initial consultation, once we understand the specifics of your matter. We also offer flexible engagement structures, including flat-fee arrangements for defined-scope examinations and hourly billing for investigations where the scope may evolve. Contact us at 919-348-4912 for a confidential consultation and cost estimate.

Protect Your Evidence. Protect Your Case.

Digital evidence is fragile and time-sensitive. Whether you are facing a cybersecurity incident, preparing for litigation, or investigating employee misconduct, the sooner you engage a licensed forensic examiner, the stronger your evidentiary position will be.

919-348-4912

Petronella Technology Group · 5540 Centerview Dr., Suite 200, Raleigh, NC 27606

BBB Accredited Since 2003 · Serving the Research Triangle Since 2002 · 2,500+ Clients

Hear from our clients

"Top qualities: Great Results, Expert, High Integrity. I have seen Craig grow his business from when he first started with us as our IT Consultant. He is great person all around. Easy to work with, very conscientious on his work, and always willing to help. He has worked extremely hard and I'm glad to see the rewards of his hard work with his company expanding and thriving. His Top qualities are: Great Results, Expert, High Integrity."

Carl Anderson Fred Anderson Toyota Raleigh, NC

"I would recommend him to any client who is looking for any IT help for their organization. I have worked with Craig with the implementation of EMR (Electronic Medical Records) in the Durham area. He is extremely professional and very knowledgable with the current technologies. He ensured that we never had any issues with the IT infrastructure at the practice and that was one of the primary reasons that the implementation went smoothly. He scored high points with his client and us with his professionalism and knowledge and I would recommend him to any client who is looking for any IT help for their organization."

Jaimin Anandjiwala Director of Enterprise Business Division eClinicalWorks EMR

"Craig is very insightful and has the experience and expertise to fix any IT Support issue your company may run into."

Web Design and Marketing Agency in Raleigh, NC

"Petronella Technology Group, Inc. is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. We have been working with Craig and his team for more than 16 years for all of our company's computer, network and IT Support needs in-house as well as for off-site offices. Everyone at Petronella Technology Group, Inc. is responsive, professional, conversant and able to communicate extremely technical information in comprehendible terms. Our confidence level has allowed us to recommend Petronella Technology Group, Inc. to long-time business partners and associates."

Construction Company in Cary, NC

"We appreciated the quick response time and excellent follow-up. We recommend them very highly. We are extremely pleased with Petronella Technology Group, Inc. Our experiences working with Craig have always been excellent. You and your firm are able to diagnose and correct the problems very quickly and professionally. We appreciated the quick response time and excellent follow-up. We recommend them very highly."

Locksmith Service Company in Raleigh, NC

"Craig is an absolute professional and a great pleasure to work with. would highly recommend Petronella Technology Group, Inc. and constantly receive positive feedback on Craig and his company."

Sales Training in Raleigh, NC

"Craig is a wonderful partner who follows through with great service and good value. Craig is a wonderful partner who follows through with great service and good value. His knowledge of systems sets him apart from anybody else."

Nicholas Smith Southeastern Managing Director Winmark Capital